key

Fri
24
Nov
John Lister's picture

Security Glitch Undermines Encryption Keys

Around one in a million computer encryption keys are faulty and could be compromised according to researchers. While it sounds like an obscure issue, it could be exploited by security agencies at both friendly and hostile governments. The problem is ... with the RSA encryption that's widely used for online security. It works by users having two security keys (lengthy codes), one public and one private. The public key is used for encrypting data, while the private key is needed to decrypt it. The system also allows users to "sign" encrypted messages so that recipients know the supposed sender is ... (view more)

Thu
23
Jan
John Lister's picture

Experts: Windows Feature Can Be Used as Ransomware

Ransomware attackers could turn a key Windows security tool against the system, according to new research. The tactic could also evade leading security tools. The research from SafeBreach Labs covered "EFS", otherwise known as Encrypting File ... System. EFS was released as far back as Windows 2000 (in the year 2000), and is somewhat similar to Bitlocker. The main difference between the two is that Bitlocker can encrypt an entire volume, while EFS can encrypt individual files and folders. In either case, the reason for encrypting files / folders or an entire volume is that if an ... (view more)

Wed
24
Oct
John Lister's picture

Home Gadget Promises More Secure Email

A new gadget is designed to keep emails "totally secure and private." It comes with a big financial and convenience cost, however. Helm is promoted as an alternative to web-based email such as Gmail. It's based on the idea that such services pose a ... risk because they could be hacked or the providers forced by a court to hand over messages. Instead, Helm wants people to use a personal email server in their home - a bit like an ultra-secure mailbox. Normally email servers are bulky and require considerable technical knowledge. Device Requires Physical Key The Helm device is instead ... (view more)

Fri
03
Nov
Dennis Faas's picture

How to Fix: Send Encrypted Email to Gmail (Postfix, TLS, SSL Certificates)

Infopackets Reader Martin R. writes: " The email newsletter I receive from you is showing in my gmail as "unencrypted," with a red pad lock . There is also a new warning banner that says: 'Be careful with this message. It contains content that's ... typically used to steal personal information.' The options are: learn more, report this suspicious message, ignore, or 'I trust this message.' This is not the only email I get that shows as unencrypted. What does this mean and how can it be fixed? " My response: Essentially it means that the mail you received (at gmail) was not sent using email ... (view more)

Fri
24
Mar
Dennis Faas's picture

Explained: When to Encrypt your Hard Drive, and When not to

Infopackets Reader Scott writes: " Dear Dennis, I'm thinking of turning on disk encryption for my Windows 10 computer. I've never done this before. Is there anything to be concerned about or to be aware of? " My response: This is a good question. ... The truth of the matter is that if you encrypt your entire C drive using Windows BitLocker or a third party utility, it's going to slow your system down quite a bit. The reason for this is because every single file written to the drive must be encrypted, and then decrypted when read - including your operating system files. Constantly encrypting and ... (view more)

Wed
01
Feb
John Lister's picture

Hotel Ditches Key Cards After Ransomware Attack

Hackers have forced a hotel to ditch its electronic room key system and return to physical keys. But reports that guests were locked in and out of their room turned out to be overblown. The Seehotel Jaegewirt in Austria has been targeted by at least ... four different attacks on its computer system. The most recent involved the system data being encrypted and the hackers demanding a payment in the virtual currency Bitcoin equivalent to around $1,600. The hotel mentioned the attack in a press release designed to raise awareness and warn other hotels of the need to maintain security. A news agency ... (view more)

Thu
30
Jul
John Lister's picture

Windows 10: Key Questions Answered

Windows 10 is now available. While there's no immediate rush to get it (the upgrade is free for another year), here are some of the basics to know if you're thinking of trying out the new system. Can I get Windows 10 right away, or do I have to ... wait? Many users are still waiting for Windows 10 to download to their computer, even though they have reserved their free upgrade using the 'Get Windows 10' app via the tray bar. It is possible, however, to forcefully download Windows 10 directly from Microsoft's website as an in-place upgrade or as an .ISO, which is used to create a bootable ... (view more)

Tue
16
Jun
John Lister's picture

Windows 10 Cortana Button Could Replace ESC Key

Toshiba has announced that some of its forthcoming laptops will have a dedicated Cortana key. It's designed as an easier way to control the "digital assistant" feature in Windows 10. Cortana, which is already implemented in Windows Phone devices, is ... a similar idea to Apple's dedicated virtual assistant, Siri. While Cortana features spoken information and voice control, it also combines online searches with information on user devices or computers to increase relevancy. Some examples Microsoft gives include taking notes of ideas, delivering personalized news updates, or ... (view more)

Mon
23
Feb
Dennis Faas's picture

How can a Hacker Access my Router and Network?

Infopackets Reader Dean S. writes: " Dear Dennis, I've read that most WiFi routers use weak passwords (example: admin / admin), or none by default. I understand that for security reasons, the router administrator user and password should be set to ... prevent outsiders / hackers from logging into the router and changing the WiFi settings. On my own router I am connected to it via cable, and can connect by WiFi if I login with the password set for WPA2 security. What I have not been able to understand is how does the hacker connect to the router, and how can they adjust my WiFi settings ... (view more)

Thu
19
Feb
John Lister's picture

Windows 10 to Widely Support Fingerprint, Key Logins

Windows 10 will support a key standard for security measures designed as an alternative to the traditional password. It could make it easier to use methods such as fingerprint recognition or a "key-like" USB stick. Microsoft has confirmed the ... operating system will support the Fast Identity Online (Fido) standards. That's an industry-wide specification supported by tech firms such as BlackBerry and Google and financial firms such as PayPal, Discover and Visa. (Source: windows.com ) Fido isn't specific to any one device, but rather is a specification about the way computers ... (view more)

Pages

Subscribe to RSS - key